Configure for Azure
Please complete the following steps in the listed order to configure your installed instance of the Designer Cloud Powered by Trifacta platform to integrate with the running environment cluster.
Prerequisites
Deploy running environment cluster and Trifacta node.
Note
The running environment cluster can be deployed as part of the installation process. You can also integrate the platform with a pre-existing cluster. Details are below.
Install Designer Cloud Powered by Trifacta platform on the node.
For more information, see Install for Azure.
Configure Azure
Create registered application
You must create an Azure Active Directory (AAD) application and grant it the desired access permissions, such as read/write access to resources and read/write access to the Azure Key Vault secrets.
Note
If you are integrating with Azure Databricks and are Managed Identities for authentication, please skip this section. That configuration is covered in a later step.
This service principal is used by the Designer Cloud Powered by Trifacta platform for access to all Azure resources. For more information, see https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-create-service-principal-portal.
After you have registered, acquire the following information:
Azure Property | Location | Use |
---|---|---|
Application ID | Acquire this value from the Registered app blade of the Azure Portal. | Applied to Designer Cloud Powered by Trifacta platform configuration: |
Service User Key | Create a key for the Registered app in the Azure Portal. | Applied to Designer Cloud Powered by Trifacta platform configuration: Note If you are using Azure AD to integrate with an Azure Databricks cluster, the Azure AD secret value stored in |
Directory ID | Copy the Directory ID from the Properties blade of Azure Active Directory. | Applied to Designer Cloud Powered by Trifacta platform configuration: |
To create an Azure Active Directory (AAD) application, please complete the following steps in the Azure console.
Steps:
Create registered application:
In the Azure console, navigate to Azure Active Directory > App Registrations.
Create a New App. Name it
trifacta
.Note
Retain the Application ID and Directory ID for configuration in the Designer Cloud Powered by Trifacta platform.
Create a client secret:
Navigate to Certificates & secrets.
Create a new Client secret.
Note
Retain the value of the Client secret for configuration in the Designer Cloud Powered by Trifacta platform.
Add API permissions:
Navigate to API Permissions.
Add Azure Key Vault with the
user_impersonation
permission.
These properties are applied later in the configuration process.
Configure the Platform
Configure for Azure Databricks
You can integrate the Designer Cloud Powered by Trifacta platform with Azure Databricks. For more information, see Configure for Azure Databricks.
Configure base storage layer
For Azure installations, you can set your base storage layer to be HDFS.
Note
The base storage layer must be set after installation. After it has been configured, it cannot be modified.
Azure storage | webapp.storageProtocol setting |
---|---|
ADLS Gen2 | abfss |
Configure for Key Vault
For authentication purposes, the Designer Cloud Powered by Trifacta platform must be integrated with an Azure Key Vault keystore. See Configure Azure Key Vault.
Configure for SSO
If needed, you can integrate the Designer Cloud Powered by Trifacta platform with Azure AD for Single-Sign On to the platform. See Configure SSO for Azure AD.
Configure for ADLS Gen2
Enable read-only or read-write access to ADLS Gen2. For more information, see ADLS Gen2 Access.
Configure for Azure Gov Cloud
To enable use of the Azure Gov Cloud, please perform the following configuration steps.
Note
Managed Identities is not supported for Azure Gov Cloud.
Steps:
You can apply this change through the Admin Settings Page (recommended) or
trifacta-conf.json
. For more information, see Platform Configuration Methods.Locate the following parameter and set it to
US_GOV
:"azure.environment": "US_GOV",
Save your changes and restart the platform.
Configure relational connections
If you are integrating Designer Cloud Powered by Trifacta Enterprise Edition with relational datastores, please complete the following configuration sections.
Create encryption key file
An encryption key file must be created on the Trifacta node. This key file is shared across all relational connections. See Create Encryption Key File.
Create Azure SQL Database connection
For more information, see Azure SQL Database Connections.
Create Azure SQL DW connection
For more information, see Microsoft SQL Data Warehouse Connections.
Testing
Load a dataset from the cluster.
Perform a few simple steps on the dataset.
Click Run in the Transformer page.
When specifying the job:
Click the Profile Results checkbox.
Select Spark.
When the job completes, verify that the results have been written to the appropriate location.